First published: Tue Sep 18 2012(Updated: )
SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC PCS 7 | =8.0 | |
Siemens WinCC | <=7.0 | |
Siemens WinCC | =5.0 | |
Siemens WinCC | =5.0-sp1 | |
Siemens WinCC | =6.0 | |
Siemens WinCC | =6.0-sp2 | |
Siemens WinCC | =6.0-sp3 | |
Siemens WinCC | =6.0-sp4 | |
Siemens WinCC | =7.0 | |
Siemens WinCC | =7.0-sp1 | |
Siemens WinCC | =7.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3032 is classified as a high severity vulnerability due to its potential for remote code execution via SQL injection.
To fix CVE-2012-3032, users should upgrade to at least Siemens WinCC version 8.0 or apply the appropriate patches provided by Siemens.
CVE-2012-3032 affects Siemens WinCC versions 7.0 SP3 and earlier, as well as SIMATIC PCS7 and versions of WinCC 5.0 through 7.0.
The exploit method for CVE-2012-3032 involves executing arbitrary SQL commands through a crafted SOAP message.
Yes, there are known exploits for CVE-2012-3032 that leverage SQL injection to manipulate database queries.